EVENT TICKETS
ALL TICKETS >
2025 New Year's Eve
Regular Events
Hurry! Get Your Tickets Now! Countdown has begun!!

2025 Midnight Madness NYE PARTY
Regular Events
Join us for an unforgettable night filled with glitz, glamour, and good vibes! The 2025 Midnight Madness NYE Party promises to be a night to remember with Live Music by DJ Malay

Big Fat New Year Eve 2025
Regular Events
Arizona's Largest & Hottest New Year’s Eve Event: Big Fat Bollywood Bash - Tuesday Dec 31, 2024. Tickets @ early bird pricing on sale now (limited quantity of group discount

Petya or 'NotPetya', the ransomware mystery lingersSan Francisco/New Delhi, June 30 (AZINS) Initially thought as the 'Petya' ransomware outbreak that shut computers in several countries, cyber security researchers are now dubbing it as a new form of malware attack that doesn't demand ransom but permanently destroys data.

"In other words, the researchers said, the payload delivered in Tuesday's outbreak wasn't ransomware at all. Instead, its true objective was to permanently wipe out as many hard drives as possible on infected networks," arstechnica reported on Friday.

Researchers at Moscow-based cyber security firm Kaspersky Lab have labelled the malware a "wiper."

Kaspersky Lab experts said the new malware is significantly different from all earlier known versions of 'Petya'.

"And that's why we are addressing it as a separate malware family. We've named it 'ExPetr' (or 'NotPetya' -- unofficially)," the Kaspersky Lab blog post said.

The attack appears to be complex, involving several attack vectors.

"We can confirm that a modified 'EternalBlue' exploit is used for propagation, at least within corporate networks," it read.

'ExPetr' (aka 'NotPetya') does not have that installation ID (the 'installation key' shown in the 'ExPetr' ransom note is just a random gibberish), which means that the threat actor could not extract the necessary information needed for decryption.

"In short, victims could not recover their data," the researchers added.

In the 2016 version of 'Petya', the ID contained crucial information for the key recovery.

"Tuesday's malware, by contrast, was generated using pseudorandom data that was unrelated to the corresponding key," wrote Kaspersky Lab researchers Anton Ivanov and Orkhan Mamedov.

Meanwhile, Janus Cybercrime Solutions, the author of 'Petya' resurfaced on Twitter, offering to help those whose files can no longer be recovered.

"The altruistic gesture, even if it does prove fruitless, is uncharacteristic of the criminal syndicate that launched an underworld enterprise by placing powerful exploits in the hands of others to deploy as they see fit," said a Gizmodo report.